This thesis examines the challenges of information-theoretic secret communication that exploits the temporal and spatial variations of the wireless medium to improve secret communication rates. We first examine the secrecy capacity of a system consisting of independent parallel channels with one transmitter, one intended receiver and one eavesdropper. We show that the secrecy capacity of the system is the sum of the secrecy capacities of the individual subchannels. We further derive the optimal power allocation strategy for a system of parallel AWGN channels subject to a total power constraint, and also extend the results to random fading channels with additive Gaussian noise. We then study the achievable secrecy rate with Gaussian random...
The growth of wireless networks has been considerable over the last decades. Due to the broadcast na...
Wireless channel reciprocity can be exploited by two users willing to achieve confidential communica...
For physical layer security with multiple antennas over wireless channels, we consider an artificial...
Wireless systems are susceptible to eavesdropping as an unwelcome result of the broadcast nature of ...
Abstract—We study information-theoretic security for discrete memoryless interference and broadcast ...
We consider the problem of secure communication in wireless fading channels in the presence of non-c...
Secure transmission of information over wireless channels in the presence of an eavesdropper has att...
With the rapid development of wireless communications, security becomes extremely important. In man...
The secure transmission of information over wireless systems in the presence of an eavesdropper has ...
Wireless channel reciprocity can be successfully exploited as a common source of randomness for the ...
Wireless channel reciprocity can be successfully exploited as a common source of randomness for the ...
The growth of wireless networks has been considerable over the last decades. Due to the broadcast na...
Wireless channel reciprocity can be successfully exploited as a common source of randomness for the ...
The security in wireless communication networks is an important issue due to the mobility of users a...
Wireless channel reciprocity can be exploited by two users willing to achieve confidential communica...
The growth of wireless networks has been considerable over the last decades. Due to the broadcast na...
Wireless channel reciprocity can be exploited by two users willing to achieve confidential communica...
For physical layer security with multiple antennas over wireless channels, we consider an artificial...
Wireless systems are susceptible to eavesdropping as an unwelcome result of the broadcast nature of ...
Abstract—We study information-theoretic security for discrete memoryless interference and broadcast ...
We consider the problem of secure communication in wireless fading channels in the presence of non-c...
Secure transmission of information over wireless channels in the presence of an eavesdropper has att...
With the rapid development of wireless communications, security becomes extremely important. In man...
The secure transmission of information over wireless systems in the presence of an eavesdropper has ...
Wireless channel reciprocity can be successfully exploited as a common source of randomness for the ...
Wireless channel reciprocity can be successfully exploited as a common source of randomness for the ...
The growth of wireless networks has been considerable over the last decades. Due to the broadcast na...
Wireless channel reciprocity can be successfully exploited as a common source of randomness for the ...
The security in wireless communication networks is an important issue due to the mobility of users a...
Wireless channel reciprocity can be exploited by two users willing to achieve confidential communica...
The growth of wireless networks has been considerable over the last decades. Due to the broadcast na...
Wireless channel reciprocity can be exploited by two users willing to achieve confidential communica...
For physical layer security with multiple antennas over wireless channels, we consider an artificial...